A Risk-Based Methodology and Tool Combining Threat Analysis and Power System Security Assessment

被引:9
|
作者
Ciapessoni, Emanuele [1 ]
Cirio, Diego [1 ]
Pitto, Andrea [1 ]
Marcacci, Pietro [1 ]
Lacavalla, Matteo [1 ]
Massucco, Stefano [2 ]
Silvestro, Federico [2 ]
Sforna, Marino [3 ]
机构
[1] Ric Sistema Energet RSE SpA, Via Rubattino 54, I-20134 Milan, Italy
[2] Univ Genoa, Dept Naval Elect Elect & Telecommun Engn, Via Opera Pia 11a, I-16145 Genoa, Italy
[3] TERNA Italian TSO, VG Galilei 18, I-20016 Pero, MI, Italy
来源
ENERGIES | 2018年 / 11卷 / 01期
关键词
blackouts; contingency; extreme events; power systems; probability; risk; security; threats; vulnerability;
D O I
10.3390/en11010083
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
A thorough investigation of power system security requires the analysis of the vulnerabilities to natural and man-related threats which potentially trigger multiple contingencies. In particular, extreme weather events are becoming more and more frequent due to climate changes and often cause large load disruptions on the system, thus the support for security enhancement gets tricky. Exploiting data coming from forecasting systems in a security assessment environment can help assess the risk of operating power systems subject to the disturbances provoked by the weather event itself. In this context, the paper proposes a security assessment methodology, based on an updated definition of risk suitable for power system risk evaluations. Big data analytics can be useful to get an accurate model for weather-related threats. The relevant software (SW) platform integrates the security assessment methodology with prediction systems which provide short term forecasts of the threats affecting the system. The application results on a real wet snow threat scenario in the Italian High Voltage grid demonstrate the effectiveness of the proposed approach with respect to conventional security approaches, by complementing the conventional N - 1 security criterion and exploiting big data to link the security assessment phase to the analysis of incumbent threats.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Risk-Based Admissibility Analysis of Wind Power Integration into Power System With Energy Storage System
    Zhang, Yumin
    Han, Xueshan
    Xu, Bo
    Wang, Mingqiang
    Ye, Pingfeng
    Pei, Younan
    [J]. IEEE ACCESS, 2018, 6 : 57400 - 57413
  • [42] A Risk-Based Multisensor Optimization Scheduling Method for Target Threat Assessment
    Zhang, Yunpu
    Shan, Ganlin
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [43] SMART: security model adversarial risk-based tool for systems security design evaluation
    Wortman, Paul A.
    Chandy, John A.
    [J]. JOURNAL OF CYBERSECURITY, 2020, 6 (01): : 1 - 8
  • [44] Development of a Risk-based Methodology for Rock Slope Analysis
    Moghadami, Mahsa
    Mortazavi, Ali
    [J]. INTERNATIONAL JOURNAL OF CIVIL ENGINEERING, 2018, 16 (10B) : 1317 - 1328
  • [45] A Risk-based Strategy for Power System Optimization
    Zafra-Cabeza, Ascension
    del Real, Alejandro
    Arce, Alicia
    Camacho, Eduardo F.
    Ridao, Miguel A.
    Bordons, Carlos
    [J]. 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 1905 - 1910
  • [46] Risk-based methodology for scour analysis at bridge foundations
    Bento, Ana Margarida
    Gomes, Andreia
    Viseu, Teresa
    Couto, Lucia
    Pego, Joao Pedro
    [J]. ENGINEERING STRUCTURES, 2020, 223
  • [47] Development of a Risk-based Methodology for Rock Slope Analysis
    Mahsa Moghadami
    Ali Mortazavi
    [J]. International Journal of Civil Engineering, 2018, 16 : 1317 - 1328
  • [48] Risk-based Security Assessment in Distribution Network with the Integration of Photovoltaic
    Sheng, Wanxing
    Liu, Keyan
    Cai, Yating
    Du, Songhuai
    [J]. 2016 ASIA CONFERENCE ON POWER AND ELECTRICAL ENGINEERING (ACPEE 2016), 2016, 55
  • [49] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531
  • [50] Risks of risk-based security
    Parker, Donn B.
    [J]. COMMUNICATIONS OF THE ACM, 2007, 50 (03) : 120 - 120